Past paper Q & A's (June 2016) Flashcards Preview

ICT - Living in a Digital World > Past paper Q & A's (June 2016) > Flashcards

Flashcards in Past paper Q & A's (June 2016) Deck (39):
1

If a media station is portable - what is the one thing that affects its portability

Its' size

2

Name one device that is needed to connect a media station to a WiFi Network

Any one from:
• Router
• WiFi Adapter
Accept ‘Dongle’ for WiFi
Adapter

3

Name one advantage to users of streaming videos

Video can be viewed sooner

4

Explain why the quality of video being streamed is reduced when more people connect to the network and browse the web.

Limited bandwidth is
available (1) meaning there
is more demand for WiFi (1)

Data has to be shared (1)
meaning there is reduced
data available to represent
video (1)

5

List two ways of stopping other people from connecting to your network.

Any two from:
• Password / passcode
• Hide SSID/Name
• MAC address filtering / block devices
• Disable WiFi
• Set up timed access
Allow: Only have Ethernet connections / Do not
provide network points

6

List two devices that can be used with a media station

Any two from:
• Television / TV
• Projector
• Monitor
• Earphones / Headphones
• Speakers
• Keyboard
• Remote (control) / Controller

7

What is meant by the term 'Copyright'

(A legal) protection (for the creator/owner) of
work / data

8

Give one method of blocking inappropriate videos on a media station

Any one from:
• Enable filtering / safe search settings
• Only allow certain sites
• Black list / white list
• Parental control/browser settings

9

List three personal digital devices that can receive email

Any three from:
• Smartphone
• Laptop / netbook
• Tablet
• Desktop / PC
• Smartwatch
• Smartglasses
• Portable media player
• (Smart) television
• Games console
• Single Board Computer (SBC)
• PDA

10

Describe POP3

Post Office Protocol 3 (POP3) deletes emails from the server after delivery to device.

11

Name the protocol that keeps a copy of each email on the server.

Any one from:
IMAP
IMAP4
Internet Mail Access
Protocol Interim Mail
Access Protocol

12

What is best to use when collaborating with others to create a web page?
A. Blog
B. Forum
C. RSS
or
D. Wiki

D. WIKI
(A wiki is a website that allows users to collaborate (work together) to create the content. The pages of a wiki can be edited by everyone (or those who have the password) so that different people can add to the page, edit things, fix errors, etc.)

13

In a business environment, why might you also need to provide leaflets with the same information as your website to a customer/client?

To make sure people get
the information (1)
if they
don’t have access to the
page/internet (1)

14

Which one of these reduces the security risks of data when making online payments through a a web-browser:
A. Browser
B. Digital Certificate
C. RSS
D. SMTP

B. Digital Certificate

15

State one benefit of a business using a third-party payment system

Any one from:
• Cheaper (than a merchant account)/
reduced costs
• Increases customer trust
• No need to design their own payment
system
• Reduces work for the business / Third
Party Payment Processor checks the
payment details

16

List three card details required when paying online using a bank card

Any three from:
• CCV
• (Cardholder’s) name
• Card number
• Expiry date
• Start date
• Credit/Debit
• Card Type (VISA/MasterCard/AMEX etc.)
Accept:
• Account number
• Verified by Visa password

17

Give one known security risk of paying using NFC (Near Field Communication)

No PIN is required to make a payment

18

Give one feature of NFC (Near Field Communication) payment systems that reduces the security risk to data

Any one from:
• Needs to be close to reader
• Limited to small amounts/transactions

19

Explain one advantage of photoblogging rather than email to share photos

An explanation such as:
1. Users can comment/like (the photos) (1),
raising their profile / increasing interest
(1)
2. Less data is used (sharing them) (1)
reducing costs (1)
3. Incorrect email addresses cannot be used
(1) due to typos made /
people changing email address (1)
4. Photoblogging allows one central location
to be accessed (1) so no need to send
them to each recipient (1)
5. Can set to auto upload the photographs
(1) saving time (1)
6. Some people do not use email (1) so
would not see the photos (1)
7. Quicker to view the photos (1) because
the thumbnails are displayed first (1)
8. Some email services restrict the size of
attachments (1) so may have to send in
batches / may be bounced back (1)

20

How can photoblogging reduce security of people in the photographs ?

A description to include:
• Sharing/Tagging/Commenting (1) could
mean others/strangers see images of
them. (1)
OR
• GPS (tagging) / identifiable features in
the photo (1) could mean
others/strangers know their location. (1)

21

Before uploading photographs of children, give two actions you can take to reduce the risk to the children's privacy.

Any two from:
• Remove the GPS ‘tag’ / metadata /
location (data) (from the images)
• Ask (parents’) permission
• Blur children’s faces / location features
• Choose photos where children/features
are unrecognisable/absent
• Setting up privacy/accounts/passwords
for the blog.
Allow:
• Don’t put children’s names on the photos.

22

What can be used to collect transactional data?
A. Search Engine
B. Cookies
C. Comments
or
D. Debit card

B. Cookies

23

When transactional data is collected by a company from their users - Give two examples of transactional data that can be collected.

Any two from:
• Browser
• Operating System
• IP Address
• Location
• If/when visited page previously
• Pages visited previously
• Links followed (next page visited)

24

Give one way a business can use transactional data they collect from their users

Any one from:
• Analyse which pages/photographs that
are clicked/visited are popular/not.
• Targeted marketing (e.g. Launching an
app to send to smartphone users)
• Personalisation (e.g. Mobile version of
page, accessibility settings, including user
details in welcome message)

25

State three implications of a lack of access to the internet

Any three positive and/or negative implications related
to:
• Shopping (e.g. may miss out on ‘online only’
deals / better ‘personal’/face-to-face experience
when shopping in the high street)
• Health (e.g. can’t see health information online /
less time spent in front of a screen reduces
health risks such as eye strain)
• Money management (e.g. more convenient to
bank online / not at risk from hackers)
• Travel / Leisure (e.g. no access to online booking
systems so may miss out on tickets)
• Work (e.g. can’t use professional networks)
• Education (e.g. reduced access to multimedia
learning materials / less distraction from studies)
• Communication (e.g. likely to socialise more in
person, can’t socialise online using email/social
media)
• Entertainment (e.g. can’t catch up on TV shows,
limits choice/less variety of programmes, can’t
download/stream films).
• News and Information (e.g. can’t access latest stories)

26

Which of these is a type of mobile phone connectivity?
A. SSID
B. MAC
C. GSM
D. WEP

C - GSM

(Global System for Mobile Communications)

27

Describe how you can use a smartphone to speak to someone if you cannot access the mobile phone network.

A description to include:
You could use WiFi (1) with VoIP / Video call
(1)
Use WiFi (1) calls/calling/VoLTE (1)

28

What is meant by the term World Wide Web

(Hyper)linked/Connected/A network of (1)
documents/pages/content/(web)sites (1)

29

What is meant by the term 'internet'

Award 2 marks for:
‘a network of networks’
(connected networks)

30

What is a WPA key used for?

WiFi Protected Access (WPA) key is used for:
Encryption

31

Give one feature of a smartphone that can be upgraded to enhance the user experience

Any one from:
• Operating System
• Apps
• Storage (e.g. SD card)
• Energy efficiency/consumption
• Security features
• Camera
• Audio output/speakers
• Screen

32

Describe one way that smartphones can be used with wearable computers to monitor the health and fitness of individuals

Devices can be connected
(1) using wireless
technology (1), to record
movement/biometrics (1)
using sensors (e.g.
GPS/accelerometers/ heart
rate monitor) (1)
‘movement’ = ‘steps’ etc.
‘biometrics’ = ‘heart rate’

33

Give 3 positive and 3 negative impacts on the environment of the use of digital devices

+Positives
Paper versus e-paper for books, emails vs letters (fuel costs for delivery and use of paper), downloads versus
physical products, reduction of the need to travel (to meetings / to shops) through the use of video conferencing /
VoIP, online workspaces. Recycling of old devices for use in less economically developed areas. ‘Smart home’
devices, Digital devices used to monitor pollution levels / increase communication about ‘green’ issues (e.g. wildlife
‘counting’ apps, social networking used to spread agenda of environmental ‘activist’ groups, etc)

Negatives

Materials / consuming resources for construction of devices and peripherals, (e-waste) toxins / landfill, power
requirements / battery life / efficiency, servers’ cooling systems, renewable sources, destroying habitat for (wired)

34

Give two features of a social network that could be used to publicise a video

Any two from:
• Liking
• Sharing
• Tagging
• Commenting

35

Which word describes a video that's been watched by lots of people over a short period of time?
A. Digital
B. Tagged
C. Viral
D. Open sourced

C - Viral

36

Name two ways of responding to inappropriate comments from a social network user

Any two from:
• Report
• Block
• Delete/Remove
• Ignore

37

Describe a process that can be used to reset a (forgotten) password

Example response:
Use forgot password link(1)
to receive an email (1)
with a link to a temporary
password / sms with a
code (1)
that needs to be
changed/entered (1)

38

Why should staff not check social networking profiles at work?

Explanation to include two from:
• Being distracted (1) impacts on work
health and safety / learning (1)
• It is unprofessional (1) leading to
negative impact on business / poor
reputation of the business (1)
• Possible impact on staff health (1) for
which the employer is responsible (1)
• The content may be visible (1) to
children/parents/colleagues (1)

39

Discus the impact of widespread use on the availability, accuracy and control of online information about an individual

Availability
An organisation can learn about their candidates and employees to protect the organisation’s reputation.
The linked, searchable nature of online information leads to information being readily accessible.
‘Digital footprint’ – information is permanently recorded.
Individuals can use social and specialist business networks to promote themselves or their views.
Accuracy
Others could post misleading information about an individual without them knowing.
People’s opinions/habits change, but an old opinion / action might still exist online.
Control
Possibility for others to share (with and without permission) leading to unintended audiences.
Makes us more considerate of what we post online.
Personal information should not be available to others – impacts on individuals right to privacy.
Difficult to get archived/legacy data/information removed.
Data Protection Act means individuals have a level of control over what data is held about them and safeguards for
organisations.
Impact (+ve / -ve) on:
Employment opportunities, reputation, relationships